Secured and Efficient Layered Structure of Authentication to Wireless Sensor Networks Using Coding System

Main Article Content

Syed Jalal Ahmad
Dr.Arun Kumar Kandru
Dr.Balasani Venkata Ramudu
Goski Sathish

Abstract

Autonomous in nature, Wireless Sensor Networks have several applications like sensing the environment and communicating the collected data to the end-user. Security issues arise in such networks due to the simultaneous formation of the network when required and any node can be treated as a network node. The art of work minimizes these issues by using key distribution or by detecting the energy variation of nodes. However, the first approach may not be the optimum solution, as key distribution may not be complex in wireless sensor networks due to its autonomous structure and complex calculation. Any node can enter or leave the network at any instant of time. The next approach fails when many malicious nodes enter the network with different energies and try to synchronize with the energy of the active node. To resolve these issues, a 3-level security approach is presented using Vertical Longitudinal Redundancy Residue Technique, a digital coding technique to authenticate that the node is active at three layers (i.e. network layer, transport layer, and application layer) in the network. The presented approach is validated using NS2.

Article Details

Section
Articles